nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Abstract of recent articles and literature
|
|
|
1985 |
4 |
3 |
p. 251-263 13 p. |
artikel |
2 |
A secure computer network design
|
Cohen, Fred |
|
1985 |
4 |
3 |
p. 189-205 17 p. |
artikel |
3 |
Calendar
|
|
|
1985 |
4 |
3 |
p. 265-266 2 p. |
artikel |
4 |
Communication regulation and international business
|
HJH, |
|
1985 |
4 |
3 |
p. 249- 1 p. |
artikel |
5 |
Data security and confidentiality in Europe
|
Chamoux, J.P. |
|
1985 |
4 |
3 |
p. 207-210 4 p. |
artikel |
6 |
Editorial
|
Highland, Harold Joseph |
|
1985 |
4 |
3 |
p. 185-186 2 p. |
artikel |
7 |
Floppy diskette security measures
|
Wood, Charles Cresson |
|
1985 |
4 |
3 |
p. 223-228 6 p. |
artikel |
8 |
Kahn on codes: Secrets of the new cryptology
|
HJH, |
|
1985 |
4 |
3 |
p. 247- 1 p. |
artikel |
9 |
Managing risk: A computer-aided strategy
|
HJH, |
|
1985 |
4 |
3 |
p. 247-248 2 p. |
artikel |
10 |
Modular design of information encipherment for computer systems
|
Pieprzyk, Józef P. |
|
1985 |
4 |
3 |
p. 211-218 8 p. |
artikel |
11 |
Networks '84
|
|
|
1985 |
4 |
3 |
p. 242-243 2 p. |
artikel |
12 |
New members of the international board of editors
|
|
|
1985 |
4 |
3 |
p. 187- 1 p. |
artikel |
13 |
Proceedings of the seventh computer security group conference
|
EHH, |
|
1985 |
4 |
3 |
p. 249-250 2 p. |
artikel |
14 |
Securicom '85
|
|
|
1985 |
4 |
3 |
p. 238-242 5 p. |
artikel |
15 |
Security for computer networks
|
Wood, Charles Cresson |
|
1985 |
4 |
3 |
p. 248-249 2 p. |
artikel |
16 |
7th DoD/NBS computer security conference
|
|
|
1985 |
4 |
3 |
p. 229-237 9 p. |
artikel |
17 |
The impact of the Bell system breakup on DP disaster recovery planning
|
Menkus, Belden |
|
1985 |
4 |
3 |
p. 219-222 4 p. |
artikel |
18 |
Transborder data flows: access to the international on-line data-base market
|
EHH, |
|
1985 |
4 |
3 |
p. 249- 1 p. |
artikel |
19 |
U.S. computer crime legislation highlighted in special report
|
HJH, |
|
1985 |
4 |
3 |
p. 245-246 2 p. |
artikel |